submitted by /u/c0r0n3r [link] [comments] Post navigation Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight GCP CloudSQL Vulnerability Leads to Internal Container Access and Data Exposure